Categories: cyber Security

GPU-Based Malware Attack can Dodge Usual Security Checks

Cybercriminals at the moment are supplying a technique to cover and execute malicious codes from the GPU. Recently, a submit became noticed on a hacker discussion board in which a person marketed a PoC for the same.


The submit on a hacker discussion board offers short facts concerning a technique that exploits the GPU reminiscence buffer to keep malicious code and execute it from there.
According to the vendor, the technique works on Windows structures with 2. zero and better variations of the OpenCL framework for strolling code on a couple of processors, alongside GPUs.
According to claims, actors correctly ran a test on snapshots playing cards from Radeon (RX 5700), GeForce (GTX 740M/GTX 1650), and Intel (UHD 620/630).
Also, there are a few different researchers operating at VX-Underground (a danger repository) who claimed that malicious code permits binary execution through the GPU in its reminiscence.

The commercial supplying the technique became first noticed on August eight and weeks later, the vendor had spoken back that the PoC became bought by a 3rd party.


A member of the hacker discussion board said that GPU-primarily based totally malware isn’t new and had already been visible before.
He referred to a six-year-antique PoC for a Linux-primarily based totally GPU rootkit, JellyFish.
Its authors had disclosed a couple of PoCs in May 2015 that protected a GPU-primarily based totally far off get admission to trojan and a GPU-primarily based totally keylogger for Windows.

To make clear any feasible doubts, the vendor marketing and marketing the latest PoC has denied any feasible reference to the JellyFish malware.


With cybercriminals selling and promoting GPU-primarily based totally malware on hacker forums, a terrific punch of technical capabilities or revolutionary use of this idea might also additionally result in the improvement of a brand new lethal danger. The achievement of such important initiatives might also additionally result in additional traction in such malware operations. Therefore, providers of GPUs have to be listening to it and begin imposing countermeasures.

Tags: GPU GPU based malware GPU rootkit jellyfish malicious codes from POC expolit

Recent Posts

  • News

Google abused dominant position of Android in India, antitrust probe finds

Google has abused the dominant function of Android in India to illegally harm competition withinside…

4 days ago
  • Busniess

IDBI Bank strategic sale: Most service provider bankers suggest fifty-two weeks’ time

Most of the service provider bankers who had submitted bids for facilitating the strategic sale…

4 days ago